Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFA Practice Exam with Questions & Answers | Set: 6

Questions 51

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Stealth

B.

Boot sector

C.

Multipartite

D.

File

GIAC GCFA Premium Access
Questions 52

You are working with a team that will be bringing in new computers to a sales department at a company. The sales team would like to keep not only their old files, but system settings as well on the new PC's. What should you do?

Options:
A.

Use the Disk Management tool to move everything to the new computer.

B.

Copy the files and the Windows Registry to a removable media then copy it onto the new machines.

C.

Do a system backup (complete) on each old machine, then restore it onto the new machines

D.

Use the User State Migration tool to move the system settings and files to the new machines.

Questions 53

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

Options:
A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

Questions 54

Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

Options:
A.

Melissa

B.

Tequila

C.

Brain

D.

I love you

Questions 55

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:
A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces

B.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

D.

Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces

Questions 56

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?

Options:
A.

Password cracker

B.

Packet sniffer

C.

Performance Monitor

D.

Vulnerability analyzer

Questions 57

Which of the following file systems supports the hot fixing feature?

Options:
A.

FAT16

B.

exFAT

C.

FAT32

D.

NTFS

Questions 58

Which of the following file systems cannot be used to install an operating system on the hard disk drive?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Windows NT file system (NTFS)

B.

High Performance File System (HPFS)

C.

Log-structured file system (LFS)

D.

Compact Disc File System (CDFS)

E.

Novell Storage Services (NSS)

Questions 59

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

Strong encryption software should be used to store credit card information.

C.

Only authorized access should be allowed to credit card information.

D.

The NTFS file system should be implemented on a client computer.

Questions 60

You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on your company's Web site. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

B.

Look at the Web server's logs and normal traffic logging.

C.

Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D.

Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.